exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

webevent.txt

webevent.txt
Posted Oct 21, 2000

Webevent v3.3.3 (webevent.pl) is an online calendar which contains a remote cgi vulnerability which allows administrative access.

tags | exploit, remote, cgi
SHA-256 | 5496ce9dcc8d0910d984fc7e479e1a67727682f51767ceae31adf5e834118d53

webevent.txt

Change Mirror Download
To whom it may concern,

I found what seems to be a bug in a program called webevent
(www.webevent.com). Webevent is a calander program that allows multiple
users to post to, and read the calander. The bug comes in from the fact that
you still have access to the perl file that is run when the administrator
runs the program for the first time. Once you run this perl file, it asks
you to enter in the admin info, e.g name, email, and....password. I've
tested version we3.3.3, i found this version running at www.eosmith.org
(you can access firsttime at
www.eosmith.org/scripts/we3.3.3/webevent.pl?cmd=firsttime (this is used to
change the admin info and pass) and
www.eosmith.org/scripts/we3.3.3/webevent.pl?cmd=login to login. Perhaps
earlier versions have the same problem. One way around this is to simply
delete the firsttime.pl file after you configure webevent. I also wonder if
this is a problem with whether you are using the .cgi extension or .pl
extension....also, since you have access to write events once you get admin,
i am looking into how you write to the server when you create and
submitevents.
_________________________________________________________________________
Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com.

Share information about yourself, create your own public profile at
http://profiles.msn.com.

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close